
Here are the five findings every technology leader should digest:
Breakout Speed Has Shrunk Dramatically
CrowdStrike observed that the average time for an attacker to move from initial access to lateral spread known as breakout time dropped to just 29 minutes, with the fastest recorded at 27 seconds. Quick intrusions mean defenders have far less time to detect, analyse and respond to an attack.
AI is Both a Weapon and a Target
AI isn’t only a tool adversaries leverage to scale attacks; attackers are exploiting legitimate AI systems themselves. Over 90 organisations experienced malicious prompt-injection into generative AI tools to steal credentials and data, while vulnerabilities in AI-development platforms are being used for persistence and ransomware deployment.
Adversaries Blend into Trusted Paths
Rather than obvious malware, 82 % of detections were malware-free. Attackers use valid identities, SaaS integrations and cloud infrastructure to move within environments unnoticed. This highlights why traditional point-in-time assessments miss critical gaps.
Supply Chain and Zero-Day Exploits Grow
There was a notable year-over-year increase in zero-day vulnerabilities exploited before public disclosure, while supply chain compromise delivered widespread access with minimal detection. These attack vectors underline the need for proactive and continuous visibility across third parties and dependencies.
Nation-State and eCrime AI Activity Surged
AI-enabled adversaries increased operations by 89 % in 2025, with state-linked groups from China and North Korea significantly ramping up activity. These actors aren’t just more numerous; they’re better integrated with advanced tradecraft that leverages automation and AI.
Connecting to Continuous Testing & CTEM
The rapid escalation of adversary capabilities outlined by CrowdStrike emphasises the value of the Gartner CTEM Framework and continuous, adaptive testing strategies such as PTaaS. Traditional annual pen tests simply cannot match the pace of adversary evolution documented for 2025. Continuous testing reveals blind spots, exercises trust paths and simulates real-world behaviours with frequency and depth, exactly what is required when breakout can occur in seconds.
Need a partner that’s proactive about your security?
Let’s start a conversation.